Answer:
<h2>NO</h2>
Explanation:
<h2>because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.</h2><h2>Mark me brainliest plz</h2>
Answer:
Following are the solution to the given choices:
Explanation:
Given:
double currentBalance[91];//defining a double array
In point a:
The name of the array is= currentBalance.
In point b:
91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728
In point c:
Each element's data type is double.
In point d:
The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).
In point e:
To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]
Clickstream tracking tools collect data on customer activities at websites- true.
<h3>
what is the website?</h3>
- A website, often known as a website, is a collection of web pages and associated material that is published on at least one web server and given a shared domain name.
- The World Wide Web is the aggregate name for all publicly accessible websites.
- A company's internal website for its workers is an example of a private website that can only be viewed via a private network.
- Most websites focus on a single subject or objective, including news, education, business, entertainment, or social networking.
- The navigation of the website, which frequently begins with a home page, is aided by hyperlinks between web pages.
To learn more about website, refer to the following link:
brainly.com/question/9060926
#SPJ4
Answer:
T(n)=n(n+1)/2
Explanation:
See the attached picture for detailed explanation.
Group of answer choices.
a. firewalls
b. access controls
c. proxy servers
d. All of the above
Answer:
d. All of the above
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.
A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.
Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device.